Website Cookie Policy Explained

2025-03-17
Website Cookie Policy Explained

This article explains how the website uses cookies. Some cookies are used to optimize website services and are necessary for technical storage or access. Other cookies are used to store user preferences or perform anonymous statistical analysis. Some cookies are used to create user profiles, deliver ads, or track users across websites for marketing purposes. The website emphasizes that data from cookies used exclusively for anonymous statistical purposes cannot usually be used to identify users.

Read more

US Treasury Hacked via Decade-Old PostgreSQL Zero-Day

2025-03-17
US Treasury Hacked via Decade-Old PostgreSQL Zero-Day

The US Treasury suffered a data breach exploited via a nearly decade-old SQL injection vulnerability in PostgreSQL. The attack wasn't a simple SQL injection; it leveraged the output of an internal Postgres string escaping method fed directly into the psql command-line tool. Attackers used two bytes, `c0 27`, bypassing Beyond Trust's PAM tool and the pg_escape_string function, gaining full psql control and executing arbitrary system commands. This highlights how subtle, long-standing vulnerabilities, even in heavily scrutinized open-source projects, can lead to severe security breaches.

Read more

Luthor: Hiring Their First Full-Time Engineer

2025-03-17
Luthor: Hiring Their First Full-Time Engineer

Luthor, a fintech startup building AI-powered marketing compliance agents, is hiring its first full-time engineer. The role involves collaborating directly with the CEO and CTO to design and build the platform's core architecture, directly interacting with customers to gather feedback and develop innovative solutions. The tech stack includes Ruby on Rails, Postgres, React, and Docker. The ideal candidate is customer-obsessed, experienced in building and scaling high-performing B2B software products, entrepreneurial, and a strong communicator. Compensation is $120k-$180k, plus generous equity, commuter benefits, paid team vacations, and comprehensive health insurance.

Read more
Startup

Google's Gemini 2.0 Flash: A Powerful AI Image Editor That Raises Copyright Concerns

2025-03-17
Google's Gemini 2.0 Flash: A Powerful AI Image Editor That Raises Copyright Concerns

Google's new Gemini 2.0 Flash AI model boasts powerful image editing capabilities, including the ability to effortlessly remove watermarks from images, even those from well-known stock photo agencies like Getty Images. This functionality has sparked copyright concerns, as removing watermarks without permission is generally illegal under US copyright law. While Google labels the feature as experimental and available only to developers, its powerful watermark removal capabilities and lack of usage restrictions make it a potential tool for copyright infringement. Other AI models, such as Anthropic's Claude 3.7 Sonnet and OpenAI's GPT-4o, explicitly refuse to remove watermarks, considering it unethical and potentially illegal.

Read more

AI-Powered Lease Analysis: Negotiate Your Rental Agreement Like a Pro

2025-03-17

This AI-powered platform empowers you to master your rental agreement. It analyzes your lease, uncovering potential problems, unfavorable terms, and negotiation opportunities. Gain a clear understanding of your tenant rights, receive expert negotiation advice, and easily decipher complex legal jargon. The platform also provides jurisdiction-specific insights, ensuring your lease analysis is tailored to your local laws and regulations. Rent smarter, not harder.

Read more

Mobile App Revenue Gap Explodes: Top 5% Earn 500x More

2025-03-17
Mobile App Revenue Gap Explodes: Top 5% Earn 500x More

A new report from RevenueCat reveals a widening chasm in mobile app revenue. In 2024, the top 5% of apps earned 200 times more than the remaining 95%; this year, that figure has skyrocketed to 500 times! Top-performing apps rake in over $5,000 per month, while the 25th percentile earns a meager $5-20, and even less for many. A staggering 76.1% of North American developers derive over 80% of their revenue from iOS. To compensate, developers are exploring various monetization strategies, including paywalls, upsells, price increases, and even usage-based pricing for AI apps. Low subscription renewal rates are a major challenge, with less than 10% of monthly subscribers reaching their second year.

Read more

Liquid Shape Distortions: Free Psychedelic Animation Generator

2025-03-17
Liquid Shape Distortions: Free Psychedelic Animation Generator

Liquid Shape Distortions is a free, browser-based psychedelic animation generator that creates psychedelic art using liquid motion, distortion, shadows, and light. Inspired by drum & bass/acid techno music and 90s rave posters, this tool can be used to create art for music videos, concert posters, stylized animations in creative projects, or simply enjoyed alongside music. Users can utilize hotkeys and a control menu for randomization, pausing/playing, screenshots, video export, music playback, and customization of canvas size, animation speed, patterns, and colors. The animation is created with WebGL shaders, resulting in unique art each time it's run. This open-source project is free for personal and commercial use.

Read more

Taara Lightbridge: Bridging the Connectivity Gap with Light

2025-03-17
Taara Lightbridge: Bridging the Connectivity Gap with Light

Taara addresses the growing global demand for data by offering a solution to the high cost and difficulty of traditional fiber optic cable deployment. Their Lightbridge system uses narrow beams of light to transmit data wirelessly at speeds up to 20 Gbps over distances of up to 20 kilometers. Installation takes only hours, eliminating the need for trenching or cable laying. This technology brings high-speed internet access to areas previously underserved, including dense cities, across bodies of water, and in rugged terrain, unlocking economic, educational, and social benefits.

Read more

Cracks, Demos, and the Fuzzy Copyright of the Demoscène

2025-03-17

This article explores the long-standing ambiguity surrounding copyright within the demoscene. Since the heyday of Amiga and C64 game cracking in the 1980s, a complex relationship has existed between cracking groups and demo production groups. While cracking was commonplace, even seen by some as a rebellion against expensive games, the demoscene itself has a zero-tolerance policy for plagiarism among its members. Using examples like Unit A and The Movers' cracktros, the article highlights this paradoxical culture, discussing how former crackers coexist with game companies in commercial game development, and how to view originality, code sharing, and AI-generated art. Ultimately, the article points out that the demoscene's understanding of copyright is fluid and ever-changing, lacking clear rules, relying instead on unwritten norms and community consensus.

Read more
Game cracking

Xbox 360 Hack: BadUpdate Lets You Run Homebrew Without Opening the Console

2025-03-17
Xbox 360 Hack: BadUpdate Lets You Run Homebrew Without Opening the Console

Xbox 360 modders have discovered BadUpdate, a new software exploit allowing homebrew apps and games to run via USB, bypassing Microsoft's Hypervisor. Unlike previous methods, this doesn't require opening the console. While it needs manual patching of executables and isn't perfectly reliable, requiring re-application on each boot, BadUpdate offers a new way to access the Xbox 360's homebrew scene, including games, apps, and emulators.

Read more
Game

Don't Believe the Hype: Archival Storage is an Economic, Not Technical Problem

2025-03-17
Don't Believe the Hype: Archival Storage is an Economic, Not Technical Problem

This talk challenges the conventional wisdom around 'immortal' storage media solving the archival data problem. The author uses their personal backup strategy as an example, highlighting that backup and archiving are distinct problems; backups focus on recovery time, not media lifespan. Inexpensive DVD-Rs suffice for their backups. For archiving, the author argues that 'immortal' media have a small market size, long technology maturation cycles, and are inaccessible to consumers. Large cloud providers dominate archival storage, and their pricing strategies reflect economies of scale and lock-in. Finally, the author stresses the importance of retrieval strategies and cites the LOCKSS project, emphasizing the importance of redundant backups over reliance on a single expensive, durable medium.

Read more
Tech

LAPD's Use of Dataminr to Monitor Pro-Palestine Protests Raises Privacy Concerns

2025-03-17
LAPD's Use of Dataminr to Monitor Pro-Palestine Protests Raises Privacy Concerns

The Los Angeles Police Department (LAPD) used Dataminr, a social media surveillance firm, to track pro-Palestine protests, raising concerns about privacy and freedom of speech. Dataminr provided real-time alerts to the LAPD, including information about upcoming demonstrations. Critics argue this infringes on First Amendment rights and could lead to self-censorship. Dataminr defends its actions by stating it only provides publicly available information, but its powerful data processing capabilities allow it to monitor information inaccessible to ordinary users. This incident highlights the potential threat of social media surveillance to freedom of speech and the ethical concerns surrounding government collaboration with private companies for mass surveillance.

Read more

localscope: Banishing Global Variable Bugs in Jupyter Notebooks

2025-03-17

Ever hunted down bugs caused by accidentally using global variables in a Jupyter Notebook function? localscope solves this by restricting a function's accessible scope. This prevents accidental global variable leakage, leading to more reproducible results and less debugging frustration. For example, a function calculating mean squared error relying on a global `sigma` variable will yield unpredictable results if `sigma` changes; localscope forces `sigma` to be passed as an argument, eliminating this risk.

Read more
Development

Wall Street's Dark Pools Get Even Darker: The Rise of Private Trading Rooms

2025-03-17
Wall Street's Dark Pools Get Even Darker: The Rise of Private Trading Rooms

Wall Street's dark pools, already shrouded in secrecy, are becoming even more opaque with the introduction of private trading rooms. These exclusive venues offer the core benefit of dark pools – hiding large trades to avoid price impact – but with added exclusivity, specifying who can participate. While currently a minority of dark pool volume, their adoption is rapidly growing among broker-dealers, market makers, hedge funds, and asset managers. This raises concerns about market transparency and fragmentation, but also offers improved execution quality and allows firms to handpick counterparties. However, this lack of transparency presents challenges, including difficulty gauging market depth and potential regulatory risks.

Read more

Harvard Makes Tuition Free for Families Earning $200K or Less

2025-03-17
Harvard Makes Tuition Free for Families Earning $200K or Less

Harvard University announced that tuition will be free for students from families with annual incomes of $200,000 or less, starting in the 2025-26 academic year. This expansion of financial aid will cover approximately 86% of US families, ensuring access for a broader range of students. Students from families earning $100,000 or less will also receive free room, board, and other student services. This initiative builds on Harvard's long-standing commitment to affordability, having invested over $3.6 billion in undergraduate financial aid since 2004. The move aims to create a more diverse student body, enriching the learning environment for all.

Read more

Europe's Tech Industry Calls for 'Radical Action' to Build a 'Euro Stack'

2025-03-17
Europe's Tech Industry Calls for 'Radical Action' to Build a 'Euro Stack'

Amidst rising geopolitical tensions, over 80 European tech organizations penned a letter to the EU, urging "radical action" to lessen reliance on foreign-owned digital infrastructure and services. They advocate for a "Euro Stack," prioritizing homegrown alternatives with strong commercial potential, ranging from apps and AI models to chips and connectivity. The letter stresses reducing dependence on US tech giants, proposing "Buy European" public procurement mandates and subsidies for local providers to boost demand and foster European tech growth and innovation. This follows concerns over US executive orders potentially disrupting services and highlights the need for digital sovereignty.

Read more

arXivLabs: Experimenting with Community Collaboration

2025-03-17
arXivLabs: Experimenting with Community Collaboration

arXivLabs is a framework for collaborators to develop and share new arXiv features directly on the arXiv website. Individuals and organizations involved with arXivLabs uphold arXiv's values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners who share them. Have an idea for a project that will benefit the arXiv community? Learn more about arXivLabs.

Read more
Development

coq-of-rust: Formal Verification for 100% Bug-Free Rust Code

2025-03-17
coq-of-rust: Formal Verification for 100% Bug-Free Rust Code

coq-of-rust is a formal verification tool for Rust that translates Rust programs into the Coq proof assistant to achieve 100% bug-free code. By translating Rust code to Coq, it leverages Coq's powerful proof techniques to verify the correctness of the code, eliminating all bugs. The tool supports a wide range of Rust features and offers formal verification services for critical applications like smart contracts and database engines.

Read more
Development

Neuro-First AI Startup Seeks Engineers to Build Groundbreaking Brain-Computer Interfaces

2025-03-17
Neuro-First AI Startup Seeks Engineers to Build Groundbreaking Brain-Computer Interfaces

Piramidal is hiring Research Engineers to build AI systems focused on neural data, enabling previously impossible tasks. Ideal candidates possess strong engineering skills, including designing, implementing, and enhancing massive-scale distributed machine learning systems, and a foundational understanding of neuroscience. The company offers competitive compensation and equity, driven by a mission to empower human potential through technology, championing cognitive liberty and opposing the commodification of minds.

Read more
AI

CSS Shapes Arrive in Firefox 62: Flowing Text Around Any Shape

2025-03-17
CSS Shapes Arrive in Firefox 62: Flowing Text Around Any Shape

Firefox 62 now officially supports CSS Shapes, enabling text and other content to flow around non-rectangular shapes. This article explores how to create shapes using images, gradients, and basic shapes, simplifying the process with the new tools in Firefox DevTools. Learn to use image alpha channels, gradient transparency, and predefined shapes (circle, ellipse, polygon) to control text flow, adjust spacing with `shape-margin`, and leverage `shape-image-threshold` for semi-transparent images. The article also demonstrates combining shapes with `clip-path` for advanced effects.

Read more
Development

Michael Larabel: 20 Years of Deep Dives into Linux Hardware

2025-03-17

Michael Larabel, founder and principal author of Phoronix.com, has dedicated himself since 2004 to enriching the Linux hardware experience. He's written over 20,000 articles covering Linux hardware support, performance, graphics drivers, and more. He's also the lead developer behind the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software.

Read more
Tech

Configuring Azure Entra ID as an IdP in Keycloak: A Detailed Guide

2025-03-17
Configuring Azure Entra ID as an IdP in Keycloak: A Detailed Guide

This article provides a comprehensive guide on configuring Azure Entra ID (formerly Azure Active Directory) as an Identity Provider (IdP) in Keycloak for a Spring Boot WebFlux application. It details the steps involved in both Azure and Keycloak configurations, including application creation, OpenID Connect setup, client secret and redirect URI configuration, and mapping Azure groups to Keycloak roles for user authorization. The author shares crucial tips and workarounds, such as switching the Azure interface to English for clearer terminology and selecting the appropriate IdP type in Keycloak. The guide culminates in a fully functional authentication and authorization flow, with a detailed explanation of including roles in the JWT token for backend access.

Read more
Development

Exploiting a Flaw in LCP DRM: A Simple Bypass in the Thorium Reader

2025-03-17
Exploiting a Flaw in LCP DRM: A Simple Bypass in the Thorium Reader

A blogger discovered a way to bypass LCP DRM, an ebook digital rights management scheme. The method leverages the Thorium reader's debugging functionality to easily extract unencrypted ebook content, including text, images, and metadata, without cracking encryption. This prompted a discussion with the Readium consortium (LCP DRM developers), who acknowledged a security vulnerability and stated they would improve security measures. The blogger argues this highlights deficiencies in LCP DRM, and both readers and publishers should be aware of the issue.

Read more
Tech

Akira Ransomware Cracked: GPU Brute-Force Method Discovered

2025-03-17
Akira Ransomware Cracked: GPU Brute-Force Method Discovered

Security researcher Tinyhack has discovered a GPU-based brute-force method to decrypt the Akira ransomware. Akira, known for its exorbitant ransom demands (reaching tens of millions of dollars), targets high-profile victims. Using an RTX 4090, Tinyhack cracked encrypted files in 7 days; 16 GPUs reduced this to just over 10 hours. The method exploits four nanosecond timestamps used as seeds in Akira's encryption, brute-forcing to find the precise timestamps and generate decryption keys. Success requires untouched files and local disk storage (NFS complicates decryption). While a significant cybersecurity win, Akira's developers will likely patch this vulnerability quickly.

Read more

Grimm's Fairy Tales: Not Folk, Yet Transcending the Personal

2025-03-17
Grimm's Fairy Tales: Not Folk, Yet Transcending the Personal

This article delves into the origins and impact of Grimm's Fairy Tales. Contrary to popular belief, the Grimm brothers didn't solely collect pure folklore; their sources were largely middle-class, infused with German Romantic nationalism. The article analyzes the creation process, exploring themes of social rules, class disparity, and psychological undertones within the tales. It argues that the continuous adaptation and reinterpretation of these stories transcend individual authorship, making them enduring cultural symbols.

Read more

Bambu Lab's CyberBrick: A Programmable Toy System Built for Creativity

2025-03-17
Bambu Lab's CyberBrick: A Programmable Toy System Built for Creativity

Bambu Lab, a 3D printer manufacturer, has launched CyberBrick, a new toy system under its MakerWorld brand. CyberBrick combines reusable, programmable electronics with 3D-printable models, enabling a wide range of toys based on official and community designs. Initially a Kickstarter exclusive, it's already exceeded its funding goal, with kits shipping in May 2025. The system launches with three official toys (forklift, truck, soccer bot) and a wireless controller. Kits, starting at $29.99, include solderless electronics and instructions for 3D printing. Pre-printed parts are available on Kickstarter but won't be offered through Bambu's Maker's Supply store. Beyond the official toys, CyberBrick boasts community designs like a lunar rover and a Tesla Cybertruck replica, showcasing its expandable nature. The system even extends beyond toys, with components for timelapse 3D printing. Crucially, everything is programmable, opening up endless possibilities for creative construction and coding.

Read more

HTTP/3's Divide: Hyperscale vs. Long Tail

2025-03-17
HTTP/3's Divide: Hyperscale vs. Long Tail

Despite HTTP/3 and its underlying QUIC protocol being standardized and widely used by major websites, native support in mainstream programming languages and open-source tools remains lacking. This article analyzes this paradox, arguing that its root cause lies in the internet's "two-tiered" structure: a vast gap exists between a few large tech companies ("hyperscale web") and the rest of the developers ("long tail web") in terms of resources and technological capabilities. Hyperscale players have the resources to quickly adopt new technologies, while the long tail is constrained by the update speed and compatibility issues of open-source tools. OpenSSL's handling of QUIC further exacerbates this divide. The author calls for attention to this issue to prevent the benefits of technological progress from being monopolized by a select few.

Read more
Development

The Animal That Doesn't Breathe: Henneguya salminicola

2025-03-17
The Animal That Doesn't Breathe: Henneguya salminicola

Scientists have discovered Henneguya salminicola, a parasite and the only known animal on Earth that doesn't breathe. This parasite, which lives in fish and underwater worms, lacks the mitochondrial genome—the crucial DNA responsible for respiration—found in all other multicellular animals. Research suggests this minimalist genome, shedding most multicellular traits like tissues, nerve cells, and muscles, evolved for rapid reproduction. While its energy acquisition method remains unclear, researchers hypothesize it may directly obtain energy from its host. This discovery challenges our understanding of animal evolution and fundamental life requirements.

Read more
Tech genome

Cline: Your AI coding assistant, mastering your CLI and editor

2025-03-17
Cline: Your AI coding assistant, mastering your CLI and editor

Cline is an AI assistant powered by Claude 3.7 Sonnet, capable of handling complex software development tasks step-by-step. It can create and edit files, navigate large projects, use a browser, and execute terminal commands (with permission). Cline supports multiple API providers and can extend its capabilities through the Model Context Protocol (MCP). It features a human-in-the-loop GUI for safety and reliability. Cline also boasts error monitoring, code completion, and version control, significantly boosting development efficiency.

Read more
Development code development

The 16th Century Exorcist: John Darrell and the Nottingham Boy

2025-03-17
The 16th Century Exorcist: John Darrell and the Nottingham Boy

In Nottingham, England, 1597, a young man named William Somers was believed to be possessed by demons. John Darrell, a renowned exorcist, was called upon and performed an exorcism involving prayer and fasting. Darrell's fame grew after successfully handling similar cases, but his methods remained controversial. Eventually, Somers confessed the events were faked, leading to Darrell's arrest and imprisonment for fraud, and the Church's subsequent banning of exorcisms. This historical account reveals societal superstition regarding supernatural phenomena and the clash between religious and social forces.

Read more
Misc exorcism
← Previous 1 3 4 5 6 7 8 9 219 220